This book will provide you with a deep understanding of the different security mechanisms that can be applied when architecting within the cloud, specifically within AWS. Security should always be the number one factor when deploying solutions, and understanding the impact of security at every layer is a requirement for any security practitioner.
You will be guided through every layer of AWS security from the following perspectives:
- Access management and the different techniques that can be applied to enforce it
- Policy management to understand how to define permissions that should be applied
- Host security, defining best practices on protecting instances
- Network and application security, ensuring neither are left vulnerable to exposures, vulnerabilities, or attacks
- Incident response, and how to manage security incidents to minimize the blast radius
- Log management, allowing full tracking and tracing of your solutions to automatically detect and remediate any issues found
- How to accurately record and audit your infrastructure to maintain compliance with governance standards
- Data protection, covering different encryption mechanisms to ensure your data is protected at rest and in transit